General
-
Target
36e0fa55438dbf73086d022ac1f06a91b94a10a1db769a1fd1112c854e6c6fdc
-
Size
1.3MB
-
Sample
241221-vlttaatpfq
-
MD5
0b619940c8d4d33085ccb0aebca44ff8
-
SHA1
36aa712b21c0c4a129c18cab08a45ca2511141ba
-
SHA256
36e0fa55438dbf73086d022ac1f06a91b94a10a1db769a1fd1112c854e6c6fdc
-
SHA512
40a01952cb9044c0a6b7bfc4f0bc99a0c74880b03fc0cabf938f46e3731d9e466d5b79c64de3a4003d92d6144bb68f60457a385d86617fe89136310185b3580d
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Behavioral task
behavioral1
Sample
36e0fa55438dbf73086d022ac1f06a91b94a10a1db769a1fd1112c854e6c6fdc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
36e0fa55438dbf73086d022ac1f06a91b94a10a1db769a1fd1112c854e6c6fdc.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
36e0fa55438dbf73086d022ac1f06a91b94a10a1db769a1fd1112c854e6c6fdc
-
Size
1.3MB
-
MD5
0b619940c8d4d33085ccb0aebca44ff8
-
SHA1
36aa712b21c0c4a129c18cab08a45ca2511141ba
-
SHA256
36e0fa55438dbf73086d022ac1f06a91b94a10a1db769a1fd1112c854e6c6fdc
-
SHA512
40a01952cb9044c0a6b7bfc4f0bc99a0c74880b03fc0cabf938f46e3731d9e466d5b79c64de3a4003d92d6144bb68f60457a385d86617fe89136310185b3580d
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-